Friday, November 15, 2019
Home Tags Virtual Machine

Tag: Virtual Machine

Must Need

Drozer 2.4.4

Drozer v2.4.4 – The Leading Security Assessment Framework For Android

Drozer 2.4.4  is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming...
WhatBreach

WhatBreach : OSINT Tool To Find Breached Emails & Databases

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a...
Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation Tasks

Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation...

Flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible...
DeepSearch

DeepSearch – Advanced Web Dir Scanner For Bruteforce

DeepSearch is a simple command line tool for bruteforce directories and files in websites. you can also use Dark web browser to surf anonymously. DeepSearch...
WDExtract : Extract Windows Defender database

WDExtract : Extract Windows Defender database

WDExtract is the extract Windows Defender database from vdm files and unpack it. This program distributed as-is, without any...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...